لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which two statements about IKEv2 are true if an administrator decides to implement IKEv2 in the VPN topology? (Choose two.)
A. It includes stronger Diffie-Hellman (DH) groups, such as Elliptic Curve (ECP) groups
B. It supports interoperability with devices using IKEv1
C. It exchanges a minimum of two messages to establish a secure tunnel
D. It supports the extensible authentication protocol (EAP)
عرض الإجابة
اجابة صحيحة: AD
السؤال #2
Which two statements about the Security Fabric are true? (Choose two.)
A. Only the root FortiGate collects network information and forwards it to FortiAnalyzer
B. Branch FortiGate devices must be configured first
C. FortiGate uses FortiTelemetry protocol to communicate with FortiAnalyzer
D. All FortiGate devices in the Security Fabric must have bidirectional FortiTelemetry connectivity
عرض الإجابة
اجابة صحيحة: ACD
السؤال #3
Four FortiGate devices configured for OSPF connected to the same broadcast domain. The first unit is elected as the designated router. The second unit is elected as the backup designated router. Under normal operation, how many OSPF full adjacencies are formed to each of the other two units?
A. 1
B. 2correct
C. 3
D. 4
عرض الإجابة
اجابة صحيحة: B
السؤال #4
An administrator needs to install an IPS profile without triggering false positives that can impact applications and cause problems with the user's normal traffic flow. Which action can the administrator take to prevent false positives on IPS analysis?
A. Use the IPS profile extension to select an operating system, protocol, and application for all the network internal services and users to prevent false positives
B. Enable Scan Outgoing Connections to avoid clicking suspicious links or attachments that can deliver botnet malware and create false positives
C. Use an IPS profile with action monitor, however, the administrator must be aware that this can compromise network integrity
D. Install missing or expired SSL/TLS certificates on the client PC to prevent expected false positives
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Refer to the exhibit, which shows a partial web filter profile configuration.
A. FortiGate will block the connection, based on the FortiGuard category based filter configuration
B. FortiGate will block the connection as an invalid UR
C. FortiGate will exempt the connection, based on the Web Content Filter configuration
D. FortiGate will allow the connection, based onthe URL Filter configuration
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Refer to the exhibit, which shows the output of a web filtering diagnose command. Which configuration change would result in non-zero results in the cache statistics section?
A. set server-type rating under config system central-management
B. set webfilter-cache enable under config system fortiguardcorrect
C. set webfilter-force-off disable under config system fortiguard
D. set ngfw-mode policy-based under config system settings
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Refer to the exhibit. The routing tables of FortiGate_A and FortiGate_B are shown. FortiGate_A and FortiGate_B are in the same autonomous system. The administrator wants to dynamically add only route 172.16.1.248/30 on FortiGate_A. What must the administrator configure?
A. The prefix 172
B. A BGP route map out for 172
C. Enable Redistribute Connected in the BGP section on FortiGate_B
D. A BGP route map in for 172
عرض الإجابة
اجابة صحيحة: B
السؤال #8
An administrator must ensure that users cannot access sites containing malware and spyware, while also protecting them from phishing attempts. What is the most resource-efficient method to block access to these sites?
A. Enable antivirus profiles to scan all web traffic and block downloads from these malicious sites
B. Configure FortiGuard Web Filtering and block the categories malware, spyware, and phishing to prevent access to such sites
C. Create a custom IPS policy to monitor and block all outbound traffic related to malware, spyware, and phishing sites
D. Set up a DNS filter and block domains related to these categories to stop users from reaching malicious content
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Which statement about memory conserve mode is true?
A. A FortiGate exits conserve mode when the configured memory use threshold reaches yellow
B. A FortiGate Starts dropping all the new and old sessions when the configured memory use threshold reaches extreme
C. A FortiGate starts dropping new sessions when the configured memory use threshold reaches red
D. A FortiGate enters conserve mode when the configured memory use threshold reaches redcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #10
A company that acquired multiple branches across different countries needs to install new FortiGate devices on each of those branches. However, the IT staff lacks sufficient knowledge to implement the initial configuration on the FortiGate devices. Which three approaches can the company take to successfully deploy advanced initial configurations on remote branches? (Choose three.)
A. Use metadata variables to dynamically assign values according to each FortiGate device
B. Use provisioning templates and install configuration settings at the device layer
C. Use the Global ADOM to deploy global object configurations to each FortiGate device
D. Apply Jinja in the FortiManager scripts for large-scale and advanced deployments
E. Add FortiGate devices on FortiManager as model devices, and use ZTP or LTP to connect to FortiGate devices
عرض الإجابة
اجابة صحيحة: ABE
السؤال #11
A company's guest internet policy, operating in proxy mode, blocks access to Artificial Intelligence Technology sites using FortiGuard. However, a guest user accessed a page in this category using port 8443. Which configuration changes are required for FortiGate to analyze HTTPS traffic on nonstandard ports like 8443 when full SSL inspection is active in the guest policy?
A. Add a URL wildcard domain to the website CA certificate and use it in the SSL/SSH Inspection Profile
B. In the Protocol Port Mapping section of the SSL/SSH Inspection Profile, enter 443, 8443 to analyze both standard (443) and non-standard (8443) HTTPS ports
C. To analyze nonstandard ports in web filter profiles, use TLSv1
D. Administrators can block traffic on nonstandard ports by enabling the SNI check in the SSL/SSH Inspection Profile
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Refer to the exhibit, which contains partial output from an IKE real-time debug.
A. In the phase 1 network configuration, set the IKE version to 2
B. In the phase 1 proposal configuration, add AES128-SHA128 to the list of encryption algorithms
C. In the phase 1 proposal configuration, add AESCBC-SHA2 to the list of encryption algorithms
D. In the phase 1 proposal configuration, add AES256-SHA256 to the list of encryption algorithms
عرض الإجابة
اجابة صحيحة: D
السؤال #13
How does FortiManager handle FortiGuard requests from FortiGate devices, when it is configured as a local FDS?
A. FortiManager can download and maintain local copies of FortiGuard databases
B. FortiManager supports only FortiGuard push to managed devices
C. FortiManager will respond to update requests only if they originate from a managed device
D. FortiManager does not support rating requests
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which two statements about application layer test commands are true? (Choose two.)
A. They are used to filter real-time debugs
B. They display real-time application debugs
C. Some of them can be used to restart an application
D. Some of them display statistics and configuration information about a feature or process
عرض الإجابة
اجابة صحيحة: ACD
السؤال #15
Refer to the exhibit, which shows the VDOM section of a FortiGate device.An administrator discovers that webfilter stopped working in Core1 and Core2 after a maintenance window.Which two reasons could explain why webfilter stopped working? (Choose two.)
A. The root VDOM does not have access to FortiManager in a closed network
B. The root VDOM does not have a VDOM link to connect with the Corel and Core2 VDOMs
C. The Core1 and Core2 VDOMs must also be enabled as Management VDOMs to receive FortiGuard updates
D. The root VDOM does not have access to any valid public FDN
عرض الإجابة
اجابة صحيحة: BD
السؤال #16
Which statement about the designated router (DR) and backup designated router (BDR) in an OSPF multi-access network is true?
A. Only the DR receives link state information from non-DR routers
B. Non-DR and non-BDR routers form full adjacencies to DR only
C. Non-DR and non-BDR routers send link state updates and acknowledgements to 224
D. FortiGate first checks the OSPF ID to elect a D
عرض الإجابة
اجابة صحيحة: C
السؤال #17
Why does the ISDB block layers 3 and 4 of the OSI model when applying content filtering? (Choose two.)
A. FortiGate has a predefined list of all IPs and ports for specific applications downloaded from FortiGuard
B. The ISDB blocks the IP addresses and ports of an application predefined by FortiGuard
C. The ISDB works in proxy mode, allowing the analysis of packets in layers 3 and 4 of the OSI model
D. The ISDB limits access by URL and domain
عرض الإجابة
اجابة صحيحة: AB
السؤال #18
Refer to the exhibit, which shows partial outputs from two routing debug commands. Which change must an administrator make on FortiGate to route web traffic from internal users to the internet, using ECMP?
A. Set the priority of the static default route using port1 to 10
B. Set the priority of the static default route using port2 to 1
C. Set preserve-session-route to enable
D. Set snat-route-change to enable
عرض الإجابة
اجابة صحيحة: A
السؤال #19
Refer to the exhibit, which contains the output of a web filtering diagnose command. Which statement explains why the cache statistics are all zeros?
A. The FortiGate web filter cache is disabled in the FortiGate configuration
B. FortiGate is using flow-based inspection which does not use the cache
C. The administrator has reallocated the cache memory to a separate process
D. There are no users making web requests
عرض الإجابة
اجابة صحيحة: A
السؤال #20
An administrator is designing an ADVPN network for a large enterprise with spokes that have varying numbers of internet links. They want to avoid a high number of routes and peer connections at the hub. Which method should be used to simplify routing and peer management?
A. Deploy a full-mesh VPN topology to eliminate hub dependency
B. Implement static routing over IPsec interfaces for each spoke
C. Use a dynamic routing protocol using loopback interfaces to streamline peers and routes
D. Establish a traditional hub-and-spoke VPN topology with policy routes
عرض الإجابة
اجابة صحيحة: C
السؤال #21
An administrator has enabled HA session synchronization in a HA cluster with two members. Which flag is added to a primary unit’s session to indicate that it has been synchronized to the secondary unit?
A. redir
B. dirty
C. syncedcorrect
D. nds
عرض الإجابة
اجابة صحيحة: C
السؤال #22
Refer to the exhibit, which shows the ADVPN IPsec interface representing the VPN IPsec phase 1 from Hub A to Spoke 1 and Spoke 2, and from Hub to Spoke 3 and Spoke 4. An administrator must configure an ADVPN using IBGP and EBGP to connect overlay network 1 with 2. What must the administrator configure in the phase 1 VPN IPsec configuration of the ADVPN tunnels?
A. set auto-discovery-sender enable and set network-id x
B. set auto-discovery-forwarder enable and set remote-as x
C. set auto-discovery-crossover enable and set enforce-multihop enable
D. set auto-discovery-receiver enable and set npu-offload enable
عرض الإجابة
اجابة صحيحة: C
السؤال #23
Refer to the exhibits. The Administrators section of a root FortiGate device and the Security Fabric Settings section of a downstream FortiGate device are shown. When prompted to sign in with Security Fabric in the downstream FortiGate device, a user enters the AdminSSO credentials. What is the next status for the user?
A. The user is prompted to create an SSO administrator account for AdminSSO
B. The user receives an authentication failure message
C. The user accesses the downstream FortiGate with super_admin_readonly privileges
D. The user accesses the downstream FortiGate with super_admin privileges
عرض الإجابة
اجابة صحيحة: C
السؤال #24
Which of the following statements is true regarding a FortiGate configured as an explicit web proxy?
A. FortiGate limits the number of simultaneous sessions per explicit web proxy user
B. FortiGate limits the total number of simultaneous explicit web proxy users
C. FortiGate limits the number of simultaneous sessions per explicit web proxy user
D. FortiGate limits the number of workstations that authenticate using the same web proxy user credentials
عرض الإجابة
اجابة صحيحة: B
السؤال #25
When investigating FortiGuard connectivity issues, which of the following is a valid troubleshooting step?
A. Verify management VDOM's internet access
B. Verify DNS requests are being proxied if auto-update tunneling is enabled
C. Use the FortiGuard real-time debug command to verify rating requests
D. Configure a virtual IP to forward port 443 to FortiGate's external I
عرض الإجابة
اجابة صحيحة: A
السؤال #26
What action can be taken on a FortiGate to block traffic using IPS protocol decoders, focusing on network transmission patterns and application signatures?
A. Use the DNS filter to block application signatures and protocol decoders
B. Use application control to limit non-URL-based software handling
C. Enable application detection-based SD-WAN rules
D. Configure a web filter profile in flow mode
عرض الإجابة
اجابة صحيحة: B
السؤال #27
Refer to the exhibit, which shows a partial routing table. What two conclusions can you draw from the FortiGate output shown in the exhibit? (Choose two.)
A. net-device is disabled in the tunnel IPSec phase 1 configuration
B. add-route is enabled in the tunnel IPSec phase 1 configuration
C. FortiGate creates separate virtual interfaces for each VPN client
D. FortiGate is not using the destination subnets of the quick mode selectors to populate the routing table
عرض الإجابة
اجابة صحيحة: AD
السؤال #28
Refer to the exhibit, which shows the FortiGuard Distribution Network of a FortiGate device. FortiGuard Distribution Network on FortiGate An administrator is trying to find the web filter database signature on FortiGate to resolve issues with websites not being filtered correctly in a flow-mode web filter profile. Why is the web filter database version not visible on the GUI, such as with IPS definitions?
A. The web filter database is stored locally, but the administrator must run over CLI diagnose autoupdate versions
B. The web filter database is stored locally on FortiGate, but it is hidden behind the GUI
C. The web filter database is not hosted on FortiGate: FortiGate queries FortiGuard or FortiManager for web filter ratings on demand
D. The web filter database is only accessible after manual syncing with a valid FDS server using diagnose test update info
عرض الإجابة
اجابة صحيحة: C
السؤال #29
An administrator has configured a dial-up IPsec VPN with one phase 2, extended authentication (XAuth) and IKE mode configuration. The administrator has also enabled the IKE real time debug: diagnose debug application ike-1 diagnose debug enable In which order is each step and phase displayed in the debug output each time a new dial-up user is connecting to the VPN?
A. Phase1; IKE mode configuration; XAuth; phase 2
B. Phase1; XAuth; IKE mode configuration; phase2
C. Phase1; XAuth; phase 2; IKE mode configuration
D. Phase1; IKE mode configuration; phase 2; XAuth
عرض الإجابة
اجابة صحيحة: B
السؤال #30
Which two tasks are automated using the Install Wizard on FortiManager? (Choose two.)
A. Installing configuration changes to managed devices
B. Importing interface mappings from managed devices
C. Adding devices to FortiManager
D. Previewing pending configuration changes for managed devices
عرض الإجابة
اجابة صحيحة: AD

View The Updated Fortinet Exam Questions

SPOTO Provides 100% Real Fortinet Exam Questions for You to Pass Your Fortinet Exam!

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: